Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(docs): updated docs of azure pipelines integrations for old KICS versions #4683

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions 1.2.3/integrations_azurepipelines/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ <h3 id="tutorial">Tutorial</h3>
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}
</code></pre>
<p>3.4- Start the scan</p>
<pre><code class="language-shell"> ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
<pre><code class="language-shell"> ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"
</code></pre>
<p>3.5- Consume the results</p>
<pre><code class="language-shell">TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
Expand Down Expand Up @@ -307,7 +307,7 @@ <h3 id="tutorial">Tutorial</h3>
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}

echo '--- START SCANNING ---'
${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"

TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
export SEVERITY_COUNTER_HIGH=`grep '&quot;HIGH&quot;':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'`
Expand Down
2 changes: 1 addition & 1 deletion 1.2.3/search/search_index.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions 1.2.4/integrations_azurepipelines/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -263,7 +263,7 @@ <h3 id="tutorial">Tutorial</h3>
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}
</code></pre>
<p>3.4- Start the scan</p>
<pre><code class="language-shell"> ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
<pre><code class="language-shell"> ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"
</code></pre>
<p>3.5- Consume the results</p>
<pre><code class="language-shell">TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
Expand Down Expand Up @@ -311,7 +311,7 @@ <h3 id="tutorial">Tutorial</h3>
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}

echo '--- START SCANNING ---'
${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"

TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
export SEVERITY_COUNTER_HIGH=`grep '&quot;HIGH&quot;':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'`
Expand Down
2 changes: 1 addition & 1 deletion 1.2.4/search/search_index.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions 1.3.0/integrations_azurepipelines/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -294,7 +294,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}
</code></pre>
<p>3.4- Start the scan</p>
<pre><code class="language-shell"> ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
<pre><code class="language-shell"> ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"
</code></pre>
<p>3.5- Consume the results</p>
<pre><code class="language-shell">TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
Expand Down Expand Up @@ -342,7 +342,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}

echo '--- START SCANNING ---'
${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"

TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
export SEVERITY_COUNTER_HIGH=`grep '&quot;HIGH&quot;':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'`
Expand Down
2 changes: 1 addition & 1 deletion 1.3.0/search/search_index.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions 1.3.1/integrations_azurepipelines/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -290,7 +290,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}
</code></pre>
<p>3.4- Start the scan</p>
<pre><code class="language-shell"> ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
<pre><code class="language-shell"> ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"
</code></pre>
<p>3.5- Consume the results</p>
<pre><code class="language-shell">TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
Expand Down Expand Up @@ -338,7 +338,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}

echo '--- START SCANNING ---'
${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"

TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
export SEVERITY_COUNTER_HIGH=`grep '&quot;HIGH&quot;':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'`
Expand Down
2 changes: 1 addition & 1 deletion 1.3.1/search/search_index.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions 1.3.2/integrations_azurepipelines/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -294,7 +294,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}
</code></pre>
<p>3.4- Start the scan</p>
<pre><code class="language-shell"> ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
<pre><code class="language-shell"> ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"
</code></pre>
<p>3.5- Consume the results</p>
<pre><code class="language-shell">TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
Expand Down Expand Up @@ -342,7 +342,7 @@ <h3 id="tutorial">Tutorial<a class="headerlink" href="#tutorial" title="Permanen
wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR}

echo '--- START SCANNING ---'
${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json
${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name "azure-pipelines-integration" --report-formats "json,sarif"

TOTAL_SEVERITY_COUNTER=`grep '&quot;total_counter&quot;':' ' kics-results.json | awk {'print $2'}`
export SEVERITY_COUNTER_HIGH=`grep '&quot;HIGH&quot;':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'`
Expand Down
4 changes: 2 additions & 2 deletions 1.3.2/search/search_index.json
Original file line number Diff line number Diff line change
Expand Up @@ -285,7 +285,7 @@
},
{
"location": "integrations_azurepipelines/",
"text": "Integrate KICS with Azure Pipelines \u00b6 You can integrate KICS into your Azure Pipelines CI/CD. This provides you the ability to run KICS scans in your GitLab repositories and streamline vulnerabilities and misconfiguration checks to your infrastructure as code (IaC). Tutorial \u00b6 The following tutorial is a possible way of using KICS in Azure Pipelines CI. You can be creative and come up with different solutions that fit your pipelines. In this case we instruct the job to download and use the latest Linux version of KICS. 1- Edit or add a new azure-pipelines.yml file in the root of your repository 2- Declare a new stage stages: - stage: kics displayName: kics 3- Declare the steps - in this case it is a script where we follow the steps: 3.1- Get the OS name: OS=$(uname -s) 3.2- Declare version and KICS binaries to download get_latest_kics_release() { curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/' } LATEST_TAG=$(get_latest_kics_release) LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics 3.3- Download the binary mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} 3.4- Start the scan ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json 3.5- Consume the results TOTAL_SEVERITY_COUNTER=`grep '\"total_counter\"':' ' kics-results.json | awk {'print $2'}` export SEVERITY_COUNTER_HIGH=`grep '\"HIGH\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_MEDIUM=`grep '\"INFO\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_LOW=`grep '\"LOW\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_INFO=`grep '\"MEDIUM\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` echo \"TOTAL SEVERITY COUNTER $TOTAL_SEVERITY_COUNTER\" 3.6- Optionally, define a breaking point for the CI if [ \"$SEVERITY_COUNTER_HIGH\" -ge \"1\" ]; then echo \"Please fix all $SEVERITY_COUNTER_HIGH HIGH SEVERITY COUNTERS\" && exit 1; fi Here is the full content of the job trigger: - master pool: vmImage: 'ubuntu-latest' stages: - stage: kics displayName: kics jobs: - job: runKics displayName: runKics steps: - script: | get_latest_kics_release() { curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/' } OS=$(uname -s) LATEST_TAG=$(get_latest_kics_release) LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} echo '--- START SCANNING ---' ${TARGET_DIR}/kics --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.json TOTAL_SEVERITY_COUNTER=`grep '\"total_counter\"':' ' kics-results.json | awk {'print $2'}` export SEVERITY_COUNTER_HIGH=`grep '\"HIGH\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_MEDIUM=`grep '\"INFO\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_LOW=`grep '\"LOW\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_INFO=`grep '\"MEDIUM\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` echo \"TOTAL SEVERITY COUNTER $TOTAL_SEVERITY_COUNTER\" if [ \"$SEVERITY_COUNTER_HIGH\" -ge \"1\" ]; then echo \"Please fix all $SEVERITY_COUNTER_HIGH HIGH SEVERITY COUNTERS\" && exit 1; fi Example Results \u00b6 When your pipeline executes, it will run this job. If KICS finds any issues, it will fail the build. Pipeline Failure \u00b6 Pipeline Success \u00b6 View SARIF report in Azure DevOps pipelines \u00b6 It's also possible to view KICS results by publishing the SARIF report as a build artifact and installing the SARIF Azure DevOps Extension Search for the SARIF Azure DevOps Extension in the extensions marketplace . Install and give permissions to the plugin. Create a pipeline to scan IaC with KICS, configure the results output in the SARIF format, and publish it as a build artifact with artifact named as CodeAnalysisLogs : trigger: - master pool: vmImage: 'ubuntu-latest' stages: - stage: Kics displayName: Kics jobs: - job: runKics displayName: runKics steps: - script: | OS=$(uname -s) LATEST_TAG=$(curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/') LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} echo '--- START SCANNING ---' ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.sarif - task: PublishBuildArtifacts@1 inputs: pathToPublish: $(System.DefaultWorkingDirectory)/kics-results.sarif artifactName: CodeAnalysisLogs Build status \u00b6 SARIF report inside Azure Pipelines \u00b6",
"text": "Integrate KICS with Azure Pipelines \u00b6 You can integrate KICS into your Azure Pipelines CI/CD. This provides you the ability to run KICS scans in your GitLab repositories and streamline vulnerabilities and misconfiguration checks to your infrastructure as code (IaC). Tutorial \u00b6 The following tutorial is a possible way of using KICS in Azure Pipelines CI. You can be creative and come up with different solutions that fit your pipelines. In this case we instruct the job to download and use the latest Linux version of KICS. 1- Edit or add a new azure-pipelines.yml file in the root of your repository 2- Declare a new stage stages: - stage: kics displayName: kics 3- Declare the steps - in this case it is a script where we follow the steps: 3.1- Get the OS name: OS=$(uname -s) 3.2- Declare version and KICS binaries to download get_latest_kics_release() { curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/' } LATEST_TAG=$(get_latest_kics_release) LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics 3.3- Download the binary mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} 3.4- Start the scan ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name \"azure-pipelines-integration\" --report-formats \"json,sarif\" 3.5- Consume the results TOTAL_SEVERITY_COUNTER=`grep '\"total_counter\"':' ' kics-results.json | awk {'print $2'}` export SEVERITY_COUNTER_HIGH=`grep '\"HIGH\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_MEDIUM=`grep '\"INFO\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_LOW=`grep '\"LOW\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_INFO=`grep '\"MEDIUM\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` echo \"TOTAL SEVERITY COUNTER $TOTAL_SEVERITY_COUNTER\" 3.6- Optionally, define a breaking point for the CI if [ \"$SEVERITY_COUNTER_HIGH\" -ge \"1\" ]; then echo \"Please fix all $SEVERITY_COUNTER_HIGH HIGH SEVERITY COUNTERS\" && exit 1; fi Here is the full content of the job trigger: - master pool: vmImage: 'ubuntu-latest' stages: - stage: kics displayName: kics jobs: - job: runKics displayName: runKics steps: - script: | get_latest_kics_release() { curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/' } OS=$(uname -s) LATEST_TAG=$(get_latest_kics_release) LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} echo '--- START SCANNING ---' ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results --output-name \"azure-pipelines-integration\" --report-formats \"json, sarif\" TOTAL_SEVERITY_COUNTER=`grep '\"total_counter\"':' ' kics-results.json | awk {'print $2'}` export SEVERITY_COUNTER_HIGH=`grep '\"HIGH\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_MEDIUM=`grep '\"INFO\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_LOW=`grep '\"LOW\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` SEVERITY_COUNTER_INFO=`grep '\"MEDIUM\"':' ' kics-results.json | awk {'print $2'} | sed 's/.$//'` echo \"TOTAL SEVERITY COUNTER $TOTAL_SEVERITY_COUNTER\" if [ \"$SEVERITY_COUNTER_HIGH\" -ge \"1\" ]; then echo \"Please fix all $SEVERITY_COUNTER_HIGH HIGH SEVERITY COUNTERS\" && exit 1; fi Example Results \u00b6 When your pipeline executes, it will run this job. If KICS finds any issues, it will fail the build. Pipeline Failure \u00b6 Pipeline Success \u00b6 View SARIF report in Azure DevOps pipelines \u00b6 It's also possible to view KICS results by publishing the SARIF report as a build artifact and installing the SARIF Azure DevOps Extension Search for the SARIF Azure DevOps Extension in the extensions marketplace . Install and give permissions to the plugin. Create a pipeline to scan IaC with KICS, configure the results output in the SARIF format, and publish it as a build artifact with artifact named as CodeAnalysisLogs : trigger: - master pool: vmImage: 'ubuntu-latest' stages: - stage: Kics displayName: Kics jobs: - job: runKics displayName: runKics steps: - script: | OS=$(uname -s) LATEST_TAG=$(curl --silent \"https://api.github.com/repos/Checkmarx/kics/releases/latest\" | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\\1/') LATEST_VERSION=${LATEST_TAG#v} PACKAGE_NAME=kics_${LATEST_VERSION}_${OS}_x64.tar.gz TARGET_DIR=/home/vsts/kics mkdir -p ${TARGET_DIR} wget -q -c https://github.com/Checkmarx/kics/releases/download/${LATEST_TAG}/${PACKAGE_NAME} -O - | tar -xz -C ${TARGET_DIR} echo '--- START SCANNING ---' ${TARGET_DIR}/kics scan --no-progress -q ${TARGET_DIR}/assets/queries -p ${PWD} -o ${PWD}/kics-results.sarif - task: PublishBuildArtifacts@1 inputs: pathToPublish: $(System.DefaultWorkingDirectory)/kics-results.sarif artifactName: CodeAnalysisLogs Build status \u00b6 SARIF report inside Azure Pipelines \u00b6",
"title": "Azure DevOps"
},
{
Expand Down Expand Up @@ -674,4 +674,4 @@
"title": "Terraform"
}
]
}
}
Loading